How to break the encryption with Ciphey, a free & fully automated decryption tool

Although advances in cryptography are continuous and considerable, researchers are always working on developing methods to decipher even the most advanced technologies. This time, ethical hacking specialists from the International Institute of Cyber Security (IICS) will show you how to use Ciphey, a fully automated decryption tool.

Ciphey uses a deep neural network with a simple filtering system to determine the type of encryption used. It then uses a custom language verification interface for natural language processing that can detect when a given text is already decrypted.

FEATURES

According to ethical hacking specialists, Ciphey’s main features include:

  • Supports more than 50 encryption variants such as binary, Morse and Base64, plus classic ciphers like Caesar, Affine encryption, Wigener encryption and modern encryption like the XOR key, among others
  • Artificial intelligence specially created for augmented search (AuSearch), which will determine the encryption used. This process takes no more than 5 seconds
  • Ciphey’s specially constructed natural language processing module can determine whether a entered text has already been decrypted or not, whether the text is JSON, CTF or simple English, Ciphey will yield results in a matter of milliseconds
  • Multilingual support for German and English (United States, United Kingdom, Australia)
  • Incredibly fast C++ core

COMPARATIVE TABLE: CIPHEY – KATANA – CYBERCHEF MAGIG

INSTALLATION

pip3 install -U ciphey

USAGE

ciphey [options]

-t <encrypted text>, --text <encrypted text>

In this section you insert the encrypted text for which we want to decrypt, as mentioned by experts in ethical hacking.

CONCLUSIONS

Ciphey is a new and modern text decryption utility that supports a lot of encryption types and should be used if you have encrypted text and do not know how to decrypt it, mentioned by ethical hacking experts. To learn more about cybersecurity risks, malware variants, vulnerabilities, ethical hacking and information technologies, feel free to access the International Institute of Cyber Security (IICS) website.